Recent posts

TypePostAuthorRepliesLast updated
Imagebehind-the-scenes-of-malicious-webservers-figure3 jamie.riden09 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure2 jamie.riden09 years 9 weeks ago
Imagebehind-the-scenes-of-malicious-webservers-figure1 jamie.riden09 years 9 weeks ago
Book pageAPPENDIX A: ABOUT CAPTURE-HPC jamie.riden09 years 9 weeks ago
Book pageSUMMARY & RECOMMENDATIONS jamie.riden09 years 9 weeks ago
Book pageIN-DEPTH ANALYSIS jamie.riden09 years 9 weeks ago
Book pageDEFENSE EVALUATION jamie.riden09 years 9 weeks ago
Book pageIDENTIFICATION OF MALICIOUS WEB SERVERS jamie.riden09 years 9 weeks ago
Book pageINTRODUCTION jamie.riden09 years 9 weeks ago
Book pageIntroduction drupal09 years 9 weeks ago
Imagefigure18 jamie.riden09 years 9 weeks ago
Book pageSERVER HONEYPOTS VS. CLIENT HONEYPOTS jamie.riden09 years 9 weeks ago
Imagefigure19 jamie.riden09 years 9 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden09 years 9 weeks ago
Book pageFUTURE WORK jamie.riden09 years 9 weeks ago
Imagefigure17 jamie.riden09 years 9 weeks ago
Imagefigure16 jamie.riden09 years 9 weeks ago
Imagefigure8 jamie.riden09 years 9 weeks ago
Imagefigure7 jamie.riden09 years 9 weeks ago
Imagefigure6 jamie.riden09 years 9 weeks ago
Imagefigure5 jamie.riden09 years 9 weeks ago
Imagefigure4 jamie.riden09 years 9 weeks ago
Imageinput-urls-by-cat jamie.riden09 years 9 weeks ago
Book pageCLIENT-SIDE ATTACKS jamie.riden09 years 9 weeks ago
Imageclient honeypot jamie.riden09 years 9 weeks ago